


default search action
Journal of Digital Information Management, Volume 11
Volume 11, Number 1, February 2013
- Haishu Lu:

Duopoly Game Models of Water Supply in the Presence of Market Power. 1-7 - Xiaomei Guo, Lihuang Cai:

A Web-Based Virtual Lab for Accounting Skills Practice. 8-15 - Jianfeng Xu, Huzhen Song:

The Study on PenduBot Control Linear Quadratic Regulator and Particle Swarm Optimization. 16-24 - Fen Liu:

An Approach to Cultivate Talents of Information Management under the Combination of Information and Industrialization. 25-32 - Hailiang Meng, Xin-Quan Ge, Mingxia Xie:

Research on Factors Affecting Farmers' Network Information Consumption. 33-39 - Jinhua Zhang, Yongqian Liu, De Tian:

The Short-term Wind Power Forecast Based on Phase-space Reconstruction and Neural Networks. 40-45 - Xue-ling Zhu, Jia Liu, Fei Han:

Study on Current Protection in Distribution Network with Distributed Generation. 46-53 - Luo Xiao:

An Algorithm of Wavelet Data Compression Based on Wireless Sensor Network. 54-61 - Wei Fu, Mengling Shui, Yu-Ying Chen, Li Chen:

The Research and Realization of Wireless Energy Consumption Detector Based on the Internet of Things. 62-68 - Wei Chen, Jiayi Shen, Jiabin Xue:

Study on a Robot 3D Laser Radar Information Collection System. 69-75 - Donghong Shan, Zhaofeng Yang:

Hierarchical Clustering Analysis Method Based on the Grid with Obstacle Space. 76-82
Volume 11, Number 2, April 2013
- Chunlai Chai:

Modeling Resource-Constrained Project Scheduling Problem and its Solution by Genetic Algorithm. 87-96 - Jiong Mu, Lijia Xu, Qiang Huang, Chaolin Li:

Research on the E-commerce of Agricultural Products in Sichuan Province. 97-101 - Jiazhong Ouyang, Min Li:

Study on Fuzzy Evaluation of Credit Risk of Corporate Bond. 102-107 - Yao Chen, Shi Ying, Liqiang Zhang, Juebo Wu:

Exception Detection for Web Service Composition Using Improved Bayesian Network. 108-114 - Xiaopeng Li, Leilei Sun, Yonghong Liu:

High Points Recognition Method of Scraped Surface Based on Background Subtraction. 115-119 - Gongfa Li, Zheng Li, Jianyi Kong, Guozhang Jiang, Liangxi Xie:

Structure Optimization of Ladle Bottom Based on Finite Element Method. 120-124 - Zhonghua Yang, Ling Zhang:

Information Sharing in Supply Chain: A Literature Review. 125-130 - Guozhang Jiang, Enyuan He, Gongfa Li, Jianyi Kong, Liangxi Xie:

Production Procedure Optimization in Iron and Steel Enterprise. 131-135 - Tinggui Chen, Guanglan Zhou:

Vehicle Routing Optimization Problem with Time-windows and its Solution by Genetic Algorithm. 136-145 - Mingshun Yang, Yan Li, Qilong Yuan:

A Hybrid Method to Deformation Force of High-speed Cold Roll-beating Forming. 146-153 - Shuhua Xu:

Regularized Orthogonal Local Fisher Discriminant Analysis. 154-159 - He Wang:

Algorithm Research for Supply Chain Demand Prediction - Taking Fresh Agricultural Product Enterprises as Example. 160-164 - Huifeng Yan, Weifeng Wang, Jie Liu:

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters. 165-169
Volume 11, Number 3, June 2013
- Li Zhang, Weixi Zhang:

The Computer Design of Practical Filter. 175-178 - Ying Yuan, Cuirong Wang, Cong Wang:

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers. 179-183 - Tao Xu:

A Novel Fault Identifying Method with Supervised Classification and Unsupervised Clustering. 184-189 - Zelun Li, Zhicheng Huang:

Design of a Teaching Robot based on Fischertechnik Model. 190-193 - Huilong Jin, Jiaxing Chen:

Study of Methods for Constructing Families of Odd-periodic Perfect Complementary Sequence Pairs. 194-196 - Jianli Ding, Yong Zhang:

Parameters Selection in the Discrete Particle Swarm Optimization Algorithm Solving Gate and Runway Combinational Optimization Problem. 197-201 - Jianhua Li, Yiwen Wang, Yijun Wang, Yi Chen, Guo-Cheng Wang:

Research on the Anti-perspective Correction Algorithm of QR Barcode. 202-206 - Shengchao Su, Wei Zhang:

Fault Prediction of Nonlinear System Using Time Series Novelty Estimation. 207-212 - Yang Yang, Xiang Long, Biaobiao Shi:

Spanning Tree Method for Minimum Communication Costs In Grouped Virtual MapReduce Cluster. 213-219 - Zhenquan Qin, Wenjing Liu, Huizhen Jiang, Weifeng Sun:

A Diversity-based Multi-antenna Cooperative Detection Model in Cognitive Radio Network. 220-226 - Jianhong Zhang, Yuwei Xu, Zhipeng Chen:

Augmented Broadcaster Identity-based Broadcast Encryption. 227-234 - Yufan Liu, Qinghua Chen:

The Statistical Analysis of Family Names of Donators For WenChuan. 235-239 - Nan Liu, Sanyuan Zhang, Yin Zhang:

Robust Zero-Watermarking Algorithm for CAD Models. 240-247 - Sidong Cui:

Algorithm of Distributed Mining Community Structure Used in Sports Psychology Based on Local Information. 248-255
Volume 11, Number 4, August 2013
- Yang Wang, Runhua Zhang:

Research on Management of Mobile Communication Network Centralized Alarm. 261-266 - Hanan El Bakkali:

Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts. 267-276 - Wei Qi:

The Analysis of Network Structure Model and Innovation Network Characteristics for Industrial Cluster: using Complicated Network Perspective. 277-283 - Jian Ni, Yuduo Li:

The Integration of PCA, FLD and Gabor Two-dimensional Wavelet Transformation using Facial Expression Feature Extraction. 284-289 - Li-Dong Huang, Xiao-chun Shen:

The Study on Information Characteristics Analysis using Information Diffusion Method. 290-297 - Yaxin Sun, Chang Liu, Xingang Cui:

The Design and Implementation of Library's User Training System Based on Moodle. 298-306 - Boubaker Kahloula, Karim Bouamrane:

An Efficient use of a Mapping Knowledge Base. 307-313
Volume 11, Number 5, October 2013
- Jian Ni, Xifei Wei:

Application of Finite Volume Method for Solving Two-dimensional Navier Stokes Equations. 321-326 - Aimin Wang, Jie Li:

The Research of Algorithm for Data Mining Based on Fuzzy Theory. 327-334 - Jie Li, Aimin Wang:

The Research on Giant Complex System using Intelligent Decision Support System. 335-341 - Yang Zhang, Xueling Zhu, Qiang Li, Tonghe Liu:

Modeling and Simulation of DIGSILENT-based Micro-grid System. 342-351 - De-Yu Tang, Jin Yang:

A New Shuffled Frog Leaping Algorithm with Space Zoomed Factor and Gravity Attractor. 352-358 - Donghong Shan, WeiYao Li:

Research on Cluster Analysis of High Dimensional Space Based on Fuzzy Extension. 359-365 - Arpad Gellert, Adrian Florea:

Investigating a New Design Pattern for Efficient Implementation of Prediction Algorithms. 366-377 - Lei Yan, Zheng Yu, Ning Han, Jinhao Liu:

Improved Image Fusion Algorithm for Detecting Obstacles in Forests. 378-384 - Yuting Zhou, Jianbin Nie, Ning Han, Deying Li, Chen Chen:

Tuning of PID Controller for Air Conditioning Unit Based on Adaptive Genetic Algorithm. 385-389 - Haifeng Zhu:

Digital Information Facial Recognition Based on PCA and Its Improved Algorithm. 390-395 - Dmitry Ustalov, Mikhail Goldshtein:

Orchestrating the Natural Language Processing Software in the Cloud Computing Environment. 396-399
Volume 11, Number 6, December 2013
- Ruixian Yang:

Bibliometrical Analysis on the Big Data Research in China. 383-390 - Yang Liu, Yunlong Ding:

The Modeling of Genetic and Tabu Search Algorithm Based BP Neural Network in the Risk Analysis of Investment. 391-399 - Christian Wartena:

Segmentation Strategies for Passage Retrieval from Internet Video using Speech Transcripts. 400-408 - Yanjun Tong:

Study on Computer Audit Based on OLAP Technology. 409-417 - Jing Cao, Min Liu, Lijun Cao:

Research on Digital Library Personalized Information Service Model Based on Agent Model. 418-422 - Yunsheng Zhong:

Secure Digital Certificate Design Based on the RSA Algorithm. 423-429 - Rui Sun, Xiaoyan Wang:

Research on the Service Modeling Method of Information Management Software based on the Petri Net Model. 430-434 - Jinling Li, Haixiang Guo, Kejun Zhu, Deyun Wang, Jinglu Hu:

Differential Evolution for Rule Extraction and Its application in Recognizing Oil Reservoir. 435-440 - Xiaoxing Lv, Baihai Zhang:

Research on Transmission Based on Collaboration Coding in WSNs. 441-445 - Xiaoxin Lv, Baihai Zhang:

Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack. 446-452 - Haitao Wu, Shi Ying, Xiangyang Jia, Liqiang Zhang, Xu Chen:

Robustness Analysis of Social Network based on a Dynamic Model. 453-461 - Xianliang Yang, Lianlian Jia, Songling Wang:

A Leakage Monitoring System of Pipeline in Heating Network. 462-469 - Bing Xu, Zhende Li, Shiyi Xie:

Rotation Invariant Texture Image Retrieval Based on Log-Polar and NSCT. 470-475 - Dong Sun, Dan Liu:

A Novel RFID Authentication Protocol with Ownership Transfer. 476-481 - Wei Liu, Lanfei Zhao, Jianqiang Deng:

Research on an Adaptive Algorithm of Service Selection in Pervasive Computing. 482-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














